Concept of Operation Date: Authors: July 2010

Slides:



Advertisements
Similar presentations
Doc.: IEEE /0165r1 SubmissionPäivi Ruuska, NokiaSlide 1 Implementation aspects of a coexistence system Notice: This document has been.
Advertisements

Submission doc.: IEEE /XXXXr0 Month Year John Doe, Some CompanySlide 1 Insert Presentation Title Here Date: YYYY-MM-DD Authors: Notice: This document.
Submission doc.: IEEE /0032r0 April 2015 Sho Furuichi, SonySlide 1 The new coexistence use cases for IEEE Date: Authors: Notice:
Doc.: IEEE /0104r0 Submission July 2010 Alex Reznik, et. al. (InterDigital)Slide 1 Channel Selection Support in TVWS Date: Authors:
Doc.: IEEE /0118r0 Submission July 2012 Mika Kasslin, NokiaSlide 1 How to run WSO decision making with coexistence report announcements? Notice:
Doc.: IEEE /0074r2 Submission May 2010 Tuncer Baykas, NICTSlide TG1 Introduction and Status Notice: This document has been prepared to.
Submission doc.: IEEE /0097r0 November 2015 Sho Furuichi, SonySlide 1 Information exchange between independent IEEE systems Date: xx.
Submission doc.: IEEE /0011r2 January 2016 Sho Furuichi, SonySlide 1 System architecture for information exchange between independent IEEE
Doc.: IEEE /41r0 SubmissionSlide 1 P System Architecture Notice: This document has been prepared to assist IEEE It is offered.
Doc.: IEEE /20rev0 SubmissionSlide 1 P Assumptions and Architecture Notice: This document has been prepared to assist IEEE It.
Doc.: IEEE /0013r0 Submission January 2012 Mika Kasslin, NokiaSlide 1 Motivation for Monitor WSO Notice: This document has been prepared to assist.
Doc.: IEEE /129r0 Submission September 2010 Junho Jo/Jihyun Lee, LG ElectronicsSlide 1 IEEE System description Notice: This document.
Submission doc.: IEEE /0015r0 January 2016 Sho Furuichi, SonySlide 1 Proposal for CM discovery/selection/ association as CE operation Date:
Doc.: IEEE /0037r0 Submission February 2010 Joe Kwak (InterDigital)Slide 1 TVWS Architecture for SDD Date: Authors: Notice: This document.
Doc.: IEEE /0098r0 Submission July 2010 Alex Reznik, et. al. (InterDigital)Slide Security Procedures Notice: This document has been.
Doc.: IEEE /0019r0 Submission February 2010 Mika Kasslin, NokiaSlide 1 High Level Architecture View Notice: This document has been prepared to.
Doc.: IEEE /0013r0 Submission January 2010 Mika Kasslin, NokiaSlide 1 Coexistence architecture of Notice: This document has been prepared.
Doc.: IEEE /0085r1 Submission June 2010 Tuncer Baykas, NICTSlide TG1 and System Design Document Notice: This document has been prepared.
IEEE MEDIA INDEPENDENT HANDOVER DCN: hwnm Title: Thoughts on IEEE relation with IEEE Date Submitted: May 13, 2010.
Doc.: IEEE /0162r0 Submission November 2010 Jihyun Lee, LG ElectronicsSlide 1 TVWS Coexistence Procedures and Protocols Notice: This document.
TG 1 March Session Closing Report
TG1 Introduction and Status
Overview of IEEE Date: Authors: August 2014
Proposal on system description, reference model and draft outline
On the Objectives and Scope of the WS Coexistence PAR
TG1 Tutorial Review Date: Authors: May 2010 May 2010
Reference Model Proposal
Channel Classification for Logical Entities
Interfaces Date: Authors: September 2010
Coexistence Mechanism
TG1 Closing Report Date: Authors: May 2010 May 2010
P System Architecture Date: Authors: March 2010
<May,2009> doc.: IEEE <doc .....> <July 2009>
Channel Classification for Logical Entities
Resource allocation principles for coexistence system
July Tutorial – Possible Solutions
Possible Effects of FCC rules to design
Design Principles for Entity Responsibilities
PAR Comments Date: Authors: July 2010 May 2010
TG1 Introduction and Status
FCC rules and design Date: Authors: October 2010
Coexistence of CMs with different decision making algorithms
Abstract: Relationship between and
P System Architecture Date: Authors: March 2010
TG1 Tutorial Review Date: Authors: May 2010 May 2010
Neighbors and Neighbor Discovery
Negotiation between neighbor CMs
Coexistence Media Service Access Point (COEX_MEDIA_SAP)
Updates to the Draft Authors:
Updates to the Draft Authors:
TG1 and System Design Document
Examples of deployment scenarios
July Tutorial – Possible Solutions
Logical Entities Date: Authors: September 2010
Requirements Date: Authors: March 2010 Month Year
Procedures Date: Authors: November 2010
Negotiation between neighbor CMs
IEEE MEDIA INDEPENDENT HANDOVER
Possible Action Items Date: Author:
Possible Action Items Date: Author:
P System Architecture Date: Authors: March 2010
Coexistence Decision Making Topologies
P System Architecture Date: Authors: March 2010
Location Capability Negotiation
TG 1 November Session Opening Report
List of Remaining Proposals for Downselection
September 2008 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Suggested TG3c PAR Changes] Date Submitted:
Comments to IEEE /68 Date: Authors: September 2009
Month Year doc.: IEEE yy/xxxxr0 January 2016
Presentation transcript:

802.19.1 Concept of Operation Date: 2010-07-12 Authors: July 2010 May 2010 doc.: IEEE 802.11-yy/xxxxr0 July 2010 802.19.1 Concept of Operation Date: 2010-07-12 Authors: Notice: This document has been prepared to assist IEEE 802.19. It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Alex Reznik, et. al. (InterDigital) Tuncer Baykas, NICT

Abstract Present our view of how 802.19.1 devices and networks operate July 2010 Abstract Present our view of how 802.19.1 devices and networks operate Outline some main operational concepts Highlight some challenges Open up the topic for further discussion Alex Reznik, et. al. (InterDigital)

Basic Functions What does an 802.19.1 capable network/device do? July 2010 Basic Functions What does an 802.19.1 capable network/device do? Join an 802.19.1 System which consists of other 802.19.1 capable network devices that have decided to cooperate for coexistence Discovery Procedures Access and Admission Procedures Tell others what one can do Negotiate coexistence policies Not all networks devices can – or are willing – to do all things Operate in the system Request “coexistence help” Receive and execute coexistence requests Leave the system Say, bye-bye Alex Reznik, et. al. (InterDigital)

How an 802.19.1 System is Used July 2010 An 802.19.1 System provides an Coexistence Service Set (CSS) Not everyone has to subscribe to any given CSS Not everyone is allowed to subscribe (although most everyone will likely be invited) OSS include several optional services There are always entities around who are not subscribed to any of these services To Subscribe to the CSS you need to Include 802.19.1 CE in the design of the device or network Enable the 802.19.1 CE and connect to the 802.19.1 system Provide info about your 802.19.1 TVBD device(s). Select from the menu of services offered If you subscribe to a command service, you have to follow the command You have the freedom of choice in subscribing to services Presumably this will determines how you are treated – i.e. presumably the more flexible you are willing to be, the more others will work with you Once you’ve made a service commitment – you have to remain honest OSS Service rules may change The set of policies that are being employed may depend on what networks/devices are active Thus, entry/exit of networks/devices affects the policy set Networks/devices can be nomadic Moving from club-to-club must be fairly easy However, may not need continual connectivity (i.e. handover may not be needed) Alex Reznik, et. al. (InterDigital)

Basic Operational Constructs July 2010 Basic Operational Constructs An 802.19.1 System Deals with 4 Basic Types of Entities Coexistence information (simply Information when its not confusing) Mechanisms Algorithms Policies Information Information available to 802.19 system to make coexistence decisions May be provided by databases (CDIS, Regulatory, Operator) or measurements by networks and devices which comprise the system Control points (knobs) which available in the underlying MAC/PHY for enabling coexistence. Some examples Channel assignment Time-slot / sub-carrier scheduling 802.19.1 standard-defined procedures for exercising available mechanisms to facilitate coexistence. Which algorithms are used as well as what parameters they use depends on policies and available information Rules specific to each 802.19.1 system which define how algorithms are to be used to facilitate coexistence Policies are NOT defined by the standard Policy exchange protocol over the internal interfaces (CM-to-CM and CM-to-CDIS) is defined by the standard Acceptable policy languages should be listed, however do not necessarily need to be defined (i.e. defined by reference to existing work) Alex Reznik, et. al. (InterDigital)

What Might This Look Like: An Example July 2010 What Might This Look Like: An Example Mechanisms Information Algorithms Policies From M. Sherman, “Policy Engine Architecture and Certification,” IEEE SCC41 Document 2010-037 Alex Reznik, et. al. (InterDigital)

High-Level Example of Operation: System Entry and Policy Exchange July 2010 High-Level Example of Operation: System Entry and Policy Exchange Necessary Procedures Discovery Access Control Policy Negotiation Policy Enforcement Normal Operations May also include policy updates and changes Includes all other coexistence mechanisms Alex Reznik, et. al. (InterDigital)

July 2010 High-Level Example of Operation: Policy Exchange under Normal Operation Note on Policy Commitment As we noted, each network/device free to choose which policies is can/willing to follow But once it declares, it must commit to following them A de-commitment also has to be declared Alex Reznik, et. al. (InterDigital)

Conclusions Presented some initial thoughts on concept of operation July 2010 Conclusions Presented some initial thoughts on concept of operation Need further discussion Does the rest of the group agree with this concept How much of this needs to be captured in normative text How does this translate into requirements on different architectural components Alex Reznik, et. al. (InterDigital)